H
hebinGurung
This is happening ever since I updated the window.. Plz Help
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*****************************************************************************
* *
* Bugcheck Analysis *
* *
*****************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa68f2aec0b50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-GI59PR5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 184
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc00c0403f5a8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa68f2aec0b50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NVIDIA Web Helper.exe
TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000
r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff
r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx
ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef
ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e
ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb
ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444
ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f
ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776
ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227
ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110
ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16ccf4
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
4: kd>
4: kd> !analyze -v
*****************************************************************************
* *
* Bugcheck Analysis *
* *
*****************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa68f2aec0b50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-GI59PR5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc00c0403f5a8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa68f2aec0b50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NVIDIA Web Helper.exe
TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000
r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff
r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx
ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef
ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e
ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb
ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444
ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f
ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776
ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227
ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110
ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16ccf4
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
4: kd> !analyze -v
*****************************************************************************
* *
* Bugcheck Analysis *
* *
*****************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa68f2aec0b50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-GI59PR5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc00c0403f5a8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa68f2aec0b50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NVIDIA Web Helper.exe
TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000
r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff
r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx
ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef
ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e
ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb
ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444
ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f
ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776
ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227
ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110
ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16ccf4
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
Continue reading...
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*****************************************************************************
* *
* Bugcheck Analysis *
* *
*****************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa68f2aec0b50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-GI59PR5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 184
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc00c0403f5a8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa68f2aec0b50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NVIDIA Web Helper.exe
TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000
r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff
r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx
ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef
ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e
ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb
ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444
ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f
ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776
ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227
ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110
ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16ccf4
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
4: kd>
4: kd> !analyze -v
*****************************************************************************
* *
* Bugcheck Analysis *
* *
*****************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa68f2aec0b50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-GI59PR5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc00c0403f5a8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa68f2aec0b50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NVIDIA Web Helper.exe
TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000
r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff
r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx
ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef
ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e
ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb
ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444
ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f
ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776
ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227
ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110
ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16ccf4
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
4: kd> !analyze -v
*****************************************************************************
* *
* Bugcheck Analysis *
* *
*****************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc00c0403f5a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa68f2aec0b50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-GI59PR5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc00c0403f5a8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa68f2aec0b50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NVIDIA Web Helper.exe
TRAP_FRAME: ffffa68f2aec0b50 -- (.trap 0xffffa68f2aec0b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffe8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e820fae rsp=ffffa68f2aec0ce0 rbp=0000000000000000
r8=0000000000000000 r9=000000003d00116c r10=0000000fffffffff
r11=ffffa68f2aec0d68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff803`7e820fae f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa68f`2aec0958 fffff803`7ea63110 : 00000000`000000be ffffc00c`0403f5a8 8a000000`00200121 ffffa68f`2aec0b50 : nt!KeBugCheckEx
ffffa68f`2aec0960 fffff803`7e80ca4f : 8a000000`00200121 00000000`00000003 ffffa68f`2aec0bd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffa68f`2aec09b0 fffff803`7ea03c5e : 00000000`00000000 ffff9608`49c6d080 00000000`00000001 00000000`000000e1 : nt!MmAccessFault+0x4ef
ffffa68f`2aec0b50 fffff803`7e820fae : 00000001`5b5a7820 ffffc000`04120f68 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa68f`2aec0ce0 fffff803`7e82043b : ffff9608`48fdd700 00000000`00000000 00000000`00000000 87000401`56a73001 : nt!MiWsleFree+0x17e
ffffa68f`2aec0d70 fffff803`7e89df14 : ffffc000`0452acc0 ffffa68f`2aec1460 ffffa68f`2aec1460 fffffe80`0000f1b8 : nt!MiFreeWsleList+0x1bb
ffffa68f`2aec0f40 fffff803`7e89da9f : ffffa68f`2aec1560 fffffe80`0000f1b8 ffffc000`0452acc0 00000000`00000000 : nt!MiAgePteWorker+0x444
ffffa68f`2aec0fa0 fffff803`7e80b9e6 : ffffa68f`2aec1560 fffffe80`0000f1b8 00000000`00000000 87000001`70e44005 : nt!MiAgePte+0x51f
ffffa68f`2aec1040 fffff803`7e80bafb : fffffeff`00000000 ffff9608`48fdd700 00000000`00000000 ffffa68f`2aec15b0 : nt!MiWalkPageTablesRecursively+0x776
ffffa68f`2aec10e0 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000001 ffffa68f`2aec15c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1180 fffff803`7e80bafb : fffffeff`7fa00000 ffff9608`48fdd700 00000000`00000002 ffffa68f`2aec15d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec1220 fffff803`7e85de6b : 00000000`00000002 ffff9608`48fdd700 ffffa68f`00000003 ffffa68f`2aec15e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa68f`2aec12c0 fffff803`7e85d901 : ffffa68f`2aec1560 00000000`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffa68f`2aec13c0 fffff803`7e85d009 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa68f`2aec18d0 fffff803`7e85c817 : 00000000`00000000 ffffa68f`2aec1a80 ffffa68f`2aec1a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa68f`2aec19c0 fffff803`7e840560 : fffff803`7f250bc0 ffffa68f`2aec1a80 00000000`0000002a ffff8000`00000200 : nt!MiProcessWorkingSets+0x227
ffffa68f`2aec1a60 fffff803`7e9b4ec7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8000`e99c0180 : nt!MiWorkingSetManager+0x110
ffffa68f`2aec1b20 fffff803`7e917e25 : ffff9608`40368080 00000000`00000080 fffff803`7e9b4d70 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa68f`2aec1c10 fffff803`7e9fd0d8 : ffff8000`e9900180 ffff9608`40368080 fffff803`7e917dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa68f`2aec1c60 00000000`00000000 : ffffa68f`2aec2000 ffffa68f`2aebc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiRaisedIrqlFault+16ccf4
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16ccf4
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
Continue reading...